From 0e47e1e02dc00dfb0774d34794f551a4d20b6609 Mon Sep 17 00:00:00 2001 From: LenneSon <117883879+LenneSon@users.noreply.github.com> Date: Fri, 10 Jan 2025 13:00:42 +0800 Subject: [PATCH] 20250110001 - GitLab Critical Updates (#1155) * 20250110001 - GitLab Critical Updates * Update 20250110001 Applied templated layout --------- Co-authored-by: JadonWill <117053393+JadonWill@users.noreply.github.com> --- ...110001-GitLab-Critical-Updates-Advisory.md | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md diff --git a/docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md b/docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md new file mode 100644 index 00000000..b37155c4 --- /dev/null +++ b/docs/advisories/20250110001-GitLab-Critical-Updates-Advisory.md @@ -0,0 +1,25 @@ +# GitLab Releases Critical Updates - 20250110001 + +## Overview + +GitLab has released critical updates for their GitLab Community Edition(CE) and GitLab Enterprise Edition (EE) products. Successful exploitation could allow an attacker trigger a pipeline as another user under certain circumstances. + +## What is vulnerable? + +| Product(s) Affected | Versions(s) | CVE | Severity | CVSS | +| ------------------- | ----------- | ---- | ------------ | ---- | +| GitLab CE/EE | - 15.8 < 16.11.5
- 17.6 < 17.6.3
- 17.7 < 17.7.1 | [CVE-2024-5655](https://nvd.nist.gov/vuln/detail/CVE-2024-5655) | 9.6 | **Critical** | +| GitLab CE/EE | - 15.8 < 16.11.6
- 17.0 < 17.0.4
- 17.1 < 17.1.2 | [CVE-2024-6385](https://nvd.nist.gov/vuln/detail/CVE-2024-6385) | 9.6 | **Critical** | +| GitLab CE/EE | - 8.14 < 17.1.7
- 17.2 < 17.2.5
- 17.3 < 17.3.2 | [CVE-2024-6678](https://nvd.nist.gov/vuln/detail/CVE-2024-6678) | 9.9 | **Critical** | +| GitLab CE/EE | - 11.6 < 17.2.9
- 17.3 < 17.3.5
- 17.4 < 17.4.2 | [CVE-2024-8970](https://nvd.nist.gov/vuln/detail/CVE-2024-8970) | 8.2 | High | + + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)): + +- GitLab Security Release: + +## Additional References + +- SecurityOnline: